Once production applications and workloads have been moved to the cloud, re-evaluating the company’s security posture and adjusting the processes used to secure data and applications from cyberattacks are critical next steps.

Entrusting data to a cloud-based application or cloud services provider is a major step, and manufacturers need to fully educate themselves about the security risks and advantages of cloud-based software.

Whether you’re moving from an on-premise identity governance solution to the cloud or implementing a cloud-based identity governance solution for the first time, it’s important to take a close look at your organization and its needs before taking the next step.

If you’re about to join the cloud revolution, start by answering these questions: how are security responsibilities shared between clients and cloud vendors? And why do on-premises security solutions fail in the cloud?

The more questions you ask, the more you, as a customer, will have the information you need to determine if a cloud vendor is ready to be your partner in the shared security model that cloud computing requires. Here are five to start with for your Unified Communications as a Service (UCaaS) vendor.

2015 was another fascinating year for cybersecurity. From the OPM to Anthem, Ashley Madison and countless other data breaches, there was no shortage of stories capturing national attention. So what does 2016 have in store?